US9544143B2
(en)
|
2010-03-03 |
2017-01-10 |
Duo Security, Inc. |
System and method of notifying mobile devices to complete transactions
|
US9532222B2
(en)
|
2010-03-03 |
2016-12-27 |
Duo Security, Inc. |
System and method of notifying mobile devices to complete transactions after additional agent verification
|
US9118689B1
(en)
*
|
2012-04-13 |
2015-08-25 |
Zscaler, Inc. |
Archiving systems and methods for cloud based systems
|
US9823813B2
(en)
|
2013-03-15 |
2017-11-21 |
Salesforce.Com, Inc. |
Apparatus and methods for performing an action on a database record
|
US9529488B2
(en)
|
2013-03-15 |
2016-12-27 |
Salesforce.Com, Inc. |
Systems and methods for creating custom actions
|
US9471798B2
(en)
|
2013-09-20 |
2016-10-18 |
Oracle International Corporation |
Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
|
US9692789B2
(en)
|
2013-12-13 |
2017-06-27 |
Oracle International Corporation |
Techniques for cloud security monitoring and threat intelligence
|
US10063654B2
(en)
|
2013-12-13 |
2018-08-28 |
Oracle International Corporation |
Systems and methods for contextual and cross application threat detection and prediction in cloud applications
|
US11405410B2
(en)
*
|
2014-02-24 |
2022-08-02 |
Cyphort Inc. |
System and method for detecting lateral movement and data exfiltration
|
US9503467B2
(en)
|
2014-05-22 |
2016-11-22 |
Accenture Global Services Limited |
Network anomaly detection
|
US9716721B2
(en)
|
2014-08-29 |
2017-07-25 |
Accenture Global Services Limited |
Unstructured security threat information analysis
|
EP3210364B8
(fr)
|
2014-10-21 |
2021-03-10 |
Proofpoint, Inc. |
Systèmes et procédés pour une analyse de sécurité d'application
|
US9544307B2
(en)
*
|
2014-10-29 |
2017-01-10 |
Salesforce.Com, Inc. |
Providing a security mechanism on a mobile device
|
EP4155984B1
(fr)
*
|
2014-10-31 |
2024-08-28 |
Proofpoint, Inc. |
Systèmes et procédés pour effectuer de manière privée une analyse de sécurité d'application
|
US20160127418A1
(en)
*
|
2014-11-03 |
2016-05-05 |
Hewlett Packard Enterprise Development Lp |
Policy-guided fulfillment of a cloud service
|
EP3021251A1
(fr)
*
|
2014-11-14 |
2016-05-18 |
Hewlett-Packard Development Company, L.P. |
Ajustement dynamique d'un modèle pour un centre d'opérations de sécurité
|
US11049207B1
(en)
*
|
2014-12-23 |
2021-06-29 |
United Services Automobile Association (Usaa) |
Early fraud detection system
|
EP3241142B1
(fr)
*
|
2014-12-30 |
2020-09-30 |
British Telecommunications public limited company |
Détection de logiciel malveillant
|
US10230742B2
(en)
*
|
2015-01-30 |
2019-03-12 |
Anomali Incorporated |
Space and time efficient threat detection
|
US20160232349A1
(en)
*
|
2015-02-09 |
2016-08-11 |
Fortinet, Inc. |
Mobile malware detection and user notification
|
US10412106B2
(en)
*
|
2015-03-02 |
2019-09-10 |
Verizon Patent And Licensing Inc. |
Network threat detection and management system based on user behavior information
|
US10225268B2
(en)
*
|
2015-04-20 |
2019-03-05 |
Capital One Services, Llc |
Systems and methods for automated retrieval, processing, and distribution of cyber-threat information
|
US10142371B2
(en)
|
2015-04-24 |
2018-11-27 |
Oracle International Corporation |
Authorization policy customization and authorization policy lockdown
|
US10171437B2
(en)
|
2015-04-24 |
2019-01-01 |
Oracle International Corporation |
Techniques for security artifacts management
|
US10104086B2
(en)
|
2015-04-24 |
2018-10-16 |
Oracle International Corporation |
Techniques for fine grained protection of resources in an access management environment
|
EP3304336B1
(fr)
|
2015-06-01 |
2019-10-09 |
Duo Security, Inc. |
Procédé de mise en application de normes de santé de point d'extrémité
|
US10489599B2
(en)
|
2015-07-02 |
2019-11-26 |
Oracle International Corporation |
Data encryption service and customized encryption management
|
US10212078B2
(en)
*
|
2015-07-09 |
2019-02-19 |
International Business Machines Corporation |
Enabling network services in multi-tenant IAAS environment
|
WO2017018926A1
(fr)
*
|
2015-07-24 |
2017-02-02 |
Certis Cisco Security Pte Ltd |
Système et procédé de gestion à grande vitesse de renseignements sur les menaces à l'aide d'algorithmes non supervisés d'apprentissage automatique et de hiérarchisation
|
US10033604B2
(en)
*
|
2015-08-05 |
2018-07-24 |
Suse Llc |
Providing compliance/monitoring service based on content of a service controller
|
US9762616B2
(en)
*
|
2015-08-08 |
2017-09-12 |
International Business Machines Corporation |
Application-based security rights in cloud environments
|
US10425447B2
(en)
*
|
2015-08-28 |
2019-09-24 |
International Business Machines Corporation |
Incident response bus for data security incidents
|
US9774586B1
(en)
*
|
2015-08-31 |
2017-09-26 |
EMC IP Holding Company LLC |
Dynamic authorization of users in a multi-tenant environment using tenant authorization profiles
|
US9699205B2
(en)
|
2015-08-31 |
2017-07-04 |
Splunk Inc. |
Network security system
|
US9578054B1
(en)
|
2015-08-31 |
2017-02-21 |
Newman H-R Computer Design, LLC |
Hacking-resistant computer design
|
US10148679B2
(en)
|
2015-12-09 |
2018-12-04 |
Accenture Global Solutions Limited |
Connected security system
|
CN106557531B
(zh)
*
|
2015-09-30 |
2020-07-03 |
伊姆西Ip控股有限责任公司 |
复杂结构对象转换成平面化数据的方法、设备和存储介质
|
CN116860489A
(zh)
*
|
2015-11-09 |
2023-10-10 |
西普霍特公司 |
用于安全威胁的威胁风险评分的系统和方法
|
US11533240B2
(en)
|
2016-01-15 |
2022-12-20 |
Microsoft Technology Licensing, Llc |
Automatic recommendations for deployments in a data center
|
KR101905771B1
(ko)
*
|
2016-01-29 |
2018-10-11 |
주식회사 엔오디비즈웨어 |
시스템 환경 및 사용자 행동 분석 기반의 자기 방어 보안 서버와 이의 작동 방법
|
US11558407B2
(en)
*
|
2016-02-05 |
2023-01-17 |
Defensestorm, Inc. |
Enterprise policy tracking with security incident integration
|
US11283900B2
(en)
|
2016-02-08 |
2022-03-22 |
Microstrategy Incorporated |
Enterprise performance and capacity testing
|
US10440153B1
(en)
|
2016-02-08 |
2019-10-08 |
Microstrategy Incorporated |
Enterprise health score and data migration
|
US10200369B1
(en)
|
2016-02-16 |
2019-02-05 |
Symantec Corporation |
Systems and methods for dynamically validating remote requests within enterprise networks
|
US10536478B2
(en)
|
2016-02-26 |
2020-01-14 |
Oracle International Corporation |
Techniques for discovering and managing security of applications
|
US10542021B1
(en)
*
|
2016-06-20 |
2020-01-21 |
Amazon Technologies, Inc. |
Automated extraction of behavioral profile features
|
US10516680B1
(en)
*
|
2016-06-22 |
2019-12-24 |
NortonLifeLock Inc. |
Systems and methods for assessing cyber risks using incident-origin information
|
WO2018000348A1
(fr)
*
|
2016-06-30 |
2018-01-04 |
周肇梅 |
Procédé et système d'implémentation d'une sécurité intelligente sur la base d'un nuage
|
US10205738B2
(en)
|
2016-07-12 |
2019-02-12 |
Cisco Technology, Inc. |
Advanced persistent threat mitigation
|
CN107645483B
(zh)
*
|
2016-07-22 |
2021-03-19 |
创新先进技术有限公司 |
风险识别方法、风险识别装置、云风险识别装置及系统
|
US10242205B2
(en)
|
2016-08-23 |
2019-03-26 |
Red Hat, Inc. |
Automatic parameter value generation
|
US10581923B2
(en)
|
2016-09-07 |
2020-03-03 |
Cloud Of Things Ltd |
System and method for configuration of a connected device connection
|
US11089064B1
(en)
|
2016-09-12 |
2021-08-10 |
Skyhigh Networks, Llc |
Cloud security policy enforcement for custom web applications
|
WO2018080392A1
(fr)
*
|
2016-10-24 |
2018-05-03 |
Certis Cisco Security Pte Ltd |
Réseaux neuronaux analytiques unifiés quantitatifs
|
US11398906B2
(en)
*
|
2016-11-10 |
2022-07-26 |
Brickell Cryptology Llc |
Confirming receipt of audit records for audited use of a cryptographic key
|
US10855465B2
(en)
|
2016-11-10 |
2020-12-01 |
Ernest Brickell |
Audited use of a cryptographic key
|
US11405201B2
(en)
*
|
2016-11-10 |
2022-08-02 |
Brickell Cryptology Llc |
Secure transfer of protected application storage keys with change of trusted computing base
|
US10298605B2
(en)
*
|
2016-11-16 |
2019-05-21 |
Red Hat, Inc. |
Multi-tenant cloud security threat detection
|
US11323427B2
(en)
|
2016-12-02 |
2022-05-03 |
Carrier Corporation |
Mixed-mode cloud on-premise secure communication
|
US10171510B2
(en)
*
|
2016-12-14 |
2019-01-01 |
CyberSaint, Inc. |
System and method for monitoring and grading a cybersecurity framework
|
US10791134B2
(en)
*
|
2016-12-21 |
2020-09-29 |
Threat Stack, Inc. |
System and method for cloud-based operating system event and data access monitoring
|
US10848501B2
(en)
*
|
2016-12-30 |
2020-11-24 |
Microsoft Technology Licensing, Llc |
Real time pivoting on data to model governance properties
|
US10701100B2
(en)
*
|
2016-12-30 |
2020-06-30 |
Microsoft Technology Licensing, Llc |
Threat intelligence management in security and compliance environment
|
US10579821B2
(en)
*
|
2016-12-30 |
2020-03-03 |
Microsoft Technology Licensing, Llc |
Intelligence and analysis driven security and compliance recommendations
|
US10628590B2
(en)
*
|
2017-01-24 |
2020-04-21 |
Salesforce.Com, Inc. |
Application security assessment
|
US10445220B2
(en)
*
|
2017-01-25 |
2019-10-15 |
Verizon Patent And Licensing Inc. |
System and methods for application activity capture, error identification, and error correction
|
US10313441B2
(en)
*
|
2017-02-13 |
2019-06-04 |
Bank Of America Corporation |
Data processing system with machine learning engine to provide enterprise monitoring functions
|
US10536473B2
(en)
*
|
2017-02-15 |
2020-01-14 |
Microsoft Technology Licensing, Llc |
System and method for detecting anomalies associated with network traffic to cloud applications
|
US10326787B2
(en)
|
2017-02-15 |
2019-06-18 |
Microsoft Technology Licensing, Llc |
System and method for detecting anomalies including detection and removal of outliers associated with network traffic to cloud applications
|
CA3054609A1
(fr)
*
|
2017-02-27 |
2018-08-30 |
Ivanti, Inc. |
Systemes et procedes destines a des configurations de securite informatique basees sur des roles
|
US20180255099A1
(en)
*
|
2017-03-02 |
2018-09-06 |
Microsoft Technology Licensing, Llc |
Security and compliance alerts based on content, activities, and metadata in cloud
|
US10262127B2
(en)
*
|
2017-04-05 |
2019-04-16 |
General Electric Company |
Systems and method for securely sharing and executing data and models
|
US10419564B2
(en)
*
|
2017-04-18 |
2019-09-17 |
International Business Machines Corporation |
Dynamically accessing and configuring secured systems
|
US10652245B2
(en)
|
2017-05-04 |
2020-05-12 |
Ernest Brickell |
External accessibility for network devices
|
US11888883B2
(en)
|
2017-06-14 |
2024-01-30 |
International Business Machines Corporation |
Threat disposition analysis and modeling using supervised machine learning
|
US10681061B2
(en)
|
2017-06-14 |
2020-06-09 |
International Business Machines Corporation |
Feedback-based prioritized cognitive analysis
|
US10701094B2
(en)
|
2017-06-22 |
2020-06-30 |
Oracle International Corporation |
Techniques for monitoring privileged users and detecting anomalous activities in a computing environment
|
US10419460B2
(en)
*
|
2017-07-21 |
2019-09-17 |
Oath, Inc. |
Method and system for detecting abnormal online user activity
|
US10114943B1
(en)
*
|
2017-08-01 |
2018-10-30 |
Cyberark Software Ltd. |
Automated process of managing and controlling accounts on a remote computer machine
|
US11487868B2
(en)
*
|
2017-08-01 |
2022-11-01 |
Pc Matic, Inc. |
System, method, and apparatus for computer security
|
US10764295B2
(en)
*
|
2017-08-08 |
2020-09-01 |
International Business Machines Corporation |
Monitoring service policy management
|
US11165800B2
(en)
|
2017-08-28 |
2021-11-02 |
Oracle International Corporation |
Cloud based security monitoring using unsupervised pattern recognition and deep learning
|
US11847246B1
(en)
*
|
2017-09-14 |
2023-12-19 |
United Services Automobile Association (Usaa) |
Token based communications for machine learning systems
|
US10944766B2
(en)
*
|
2017-09-22 |
2021-03-09 |
Microsoft Technology Licensing, Llc |
Configurable cyber-attack trackers
|
US10713365B2
(en)
|
2017-09-28 |
2020-07-14 |
Oracle International Corporation |
Testing cloud application integrations, data, and protocols
|
US11120108B2
(en)
*
|
2017-09-30 |
2021-09-14 |
Oracle International Corporation |
Managing security artifacts for multilayered applications
|
CN109698809B
(zh)
*
|
2017-10-20 |
2021-04-02 |
中移(苏州)软件技术有限公司 |
一种账号异常登录的识别方法及装置
|
US10728256B2
(en)
*
|
2017-10-30 |
2020-07-28 |
Bank Of America Corporation |
Cross channel authentication elevation via logic repository
|
US10621341B2
(en)
|
2017-10-30 |
2020-04-14 |
Bank Of America Corporation |
Cross platform user event record aggregation system
|
US10721246B2
(en)
|
2017-10-30 |
2020-07-21 |
Bank Of America Corporation |
System for across rail silo system integration and logic repository
|
US12058160B1
(en)
|
2017-11-22 |
2024-08-06 |
Lacework, Inc. |
Generating computer code for remediating detected events
|
US11785104B2
(en)
*
|
2017-11-27 |
2023-10-10 |
Lacework, Inc. |
Learning from similar cloud deployments
|
US11973784B1
(en)
|
2017-11-27 |
2024-04-30 |
Lacework, Inc. |
Natural language interface for an anomaly detection framework
|
US11818156B1
(en)
|
2017-11-27 |
2023-11-14 |
Lacework, Inc. |
Data lake-enabled security platform
|
US11770398B1
(en)
|
2017-11-27 |
2023-09-26 |
Lacework, Inc. |
Guided anomaly detection framework
|
US11894984B2
(en)
*
|
2017-11-27 |
2024-02-06 |
Lacework, Inc. |
Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments
|
JP6933112B2
(ja)
*
|
2017-11-30 |
2021-09-08 |
富士通株式会社 |
サイバー攻撃情報処理プログラム、サイバー攻撃情報処理方法および情報処理装置
|
US11627193B2
(en)
*
|
2017-12-07 |
2023-04-11 |
Oracle International Corporation |
Method and system for tracking application activity data from remote devices and generating a corrective action data structure for the remote devices
|
US10412113B2
(en)
*
|
2017-12-08 |
2019-09-10 |
Duo Security, Inc. |
Systems and methods for intelligently configuring computer security
|
CN108121912B
(zh)
*
|
2017-12-13 |
2021-11-09 |
中国科学院软件研究所 |
一种基于神经网络的恶意云租户识别方法和装置
|
US11075946B2
(en)
*
|
2017-12-19 |
2021-07-27 |
T-Mobile Usa, Inc. |
Honeypot adaptive security system
|
US11010233B1
(en)
|
2018-01-18 |
2021-05-18 |
Pure Storage, Inc |
Hardware-based system monitoring
|
US10970395B1
(en)
|
2018-01-18 |
2021-04-06 |
Pure Storage, Inc |
Security threat monitoring for a storage system
|
CN108388631B
(zh)
*
|
2018-02-13 |
2021-05-25 |
北京奇安信科技有限公司 |
一种威胁情报共享的方法、代理装置及系统
|
EP4312420A3
(fr)
|
2018-02-20 |
2024-04-03 |
Darktrace Holdings Limited |
Procédé de partage d'analyse des menaces de cybersécurité et de mesures défensives parmi une communauté
|
EP3540618B1
(fr)
*
|
2018-03-15 |
2023-01-25 |
Rohde & Schwarz GmbH & Co. KG |
Appareil de stockage portable
|
EP3714367A4
(fr)
*
|
2018-03-22 |
2021-01-20 |
Snowflake Inc. |
Développement incrémental de fonction et capture de charge de travail dans des systèmes de base de données
|
EP3791279A4
(fr)
|
2018-05-11 |
2022-01-26 |
Cigent Technology, Inc. |
Procédé et système pour un contrôle de données et un accès aux données améliorés
|
WO2019220182A1
(fr)
*
|
2018-05-17 |
2019-11-21 |
Pratik Sharma |
Fonctions de sécurité spécifiques à une application dans un réseau
|
US11425160B2
(en)
*
|
2018-06-20 |
2022-08-23 |
OneTrust, LLC |
Automated risk assessment module with real-time compliance monitoring
|
US11271801B2
(en)
*
|
2018-06-27 |
2022-03-08 |
T-Mobile Usa, Inc. |
Compromised network node detection system
|
US10965700B2
(en)
*
|
2018-07-02 |
2021-03-30 |
Paypal, Inc. |
Fraud detection based on analysis of frequency-domain data
|
US11354338B2
(en)
|
2018-07-31 |
2022-06-07 |
International Business Machines Corporation |
Cognitive classification of workload behaviors in multi-tenant cloud computing environments
|
US10826756B2
(en)
*
|
2018-08-06 |
2020-11-03 |
Microsoft Technology Licensing, Llc |
Automatic generation of threat remediation steps by crowd sourcing security solutions
|
US10911479B2
(en)
|
2018-08-06 |
2021-02-02 |
Microsoft Technology Licensing, Llc |
Real-time mitigations for unfamiliar threat scenarios
|
EP3837867B1
(fr)
*
|
2018-09-27 |
2023-11-01 |
Palo Alto Networks, Inc. |
Sécurité basée sur une tranche de réseau dans des réseaux mobiles
|
US10944796B2
(en)
|
2018-09-27 |
2021-03-09 |
Palo Alto Networks, Inc. |
Network slice-based security in mobile networks
|
US11477238B1
(en)
*
|
2018-10-16 |
2022-10-18 |
Styra, Inc. |
Viewing aggregate policies for authorizing an API
|
US11658962B2
(en)
|
2018-12-07 |
2023-05-23 |
Cisco Technology, Inc. |
Systems and methods of push-based verification of a transaction
|
US11522898B1
(en)
*
|
2018-12-17 |
2022-12-06 |
Wells Fargo Bank, N.A. |
Autonomous configuration modeling and management
|
US10951496B2
(en)
*
|
2018-12-24 |
2021-03-16 |
Threat Stack, Inc. |
System and method for cloud-based control-plane event monitor
|
US11233804B2
(en)
|
2019-01-28 |
2022-01-25 |
Microsoft Technology Licensing, Llc |
Methods and systems for scalable privacy-preserving compromise detection in the cloud
|
US11050837B2
(en)
*
|
2019-01-31 |
2021-06-29 |
Hewlett Packard Enterprise Development Lp |
Providing cloud services associated with unused hardware resources of private cloud providers
|
US10680913B1
(en)
|
2019-02-11 |
2020-06-09 |
Hewlett Packard Enterprise Development Lp |
Error remediation in software as a service (SaaS) portals
|
WO2020167928A1
(fr)
*
|
2019-02-13 |
2020-08-20 |
Obsidian Security, Inc. |
Systèmes et procédés de détection d'incidents de sécurité dans des services d'application en nuage
|
US10880175B2
(en)
*
|
2019-03-07 |
2020-12-29 |
Lookout, Inc. |
Developing security policies for deployment to mobile devices
|
AU2019439058A1
(en)
*
|
2019-04-03 |
2021-09-02 |
Citrix Systems, Inc. |
Systems and methods for protecting remotely hosted application from malicious attacks
|
EP3980891A4
(fr)
|
2019-06-10 |
2023-06-28 |
Conquest Technology Services Corp |
Application logicielle pour évaluer, traiter et remédier en continu à un cyber-risque en temps réel
|
US11308211B2
(en)
|
2019-06-18 |
2022-04-19 |
International Business Machines Corporation |
Security incident disposition predictions based on cognitive evaluation of security knowledge graphs
|
US11297075B2
(en)
*
|
2019-07-03 |
2022-04-05 |
Microsoft Technology Licensing, Llc |
Determine suspicious user events using grouped activities
|
US10581851B1
(en)
|
2019-07-17 |
2020-03-03 |
Capital One Services, Llc |
Change monitoring and detection for a cloud computing environment
|
US11645659B2
(en)
|
2019-07-31 |
2023-05-09 |
Nutanix, Inc. |
Facilitating customers to define policies for their clouds
|
US11637748B2
(en)
|
2019-08-28 |
2023-04-25 |
Microstrategy Incorporated |
Self-optimization of computing environments
|
US11210189B2
(en)
|
2019-08-30 |
2021-12-28 |
Microstrategy Incorporated |
Monitoring performance of computing systems
|
US11611571B2
(en)
*
|
2019-09-03 |
2023-03-21 |
Code42 Software, Inc. |
Detecting suspicious file activity
|
US11475374B2
(en)
*
|
2019-09-14 |
2022-10-18 |
Oracle International Corporation |
Techniques for automated self-adjusting corporation-wide feature discovery and integration
|
US11354216B2
(en)
|
2019-09-18 |
2022-06-07 |
Microstrategy Incorporated |
Monitoring performance deviations
|
US11360881B2
(en)
|
2019-09-23 |
2022-06-14 |
Microstrategy Incorporated |
Customizing computer performance tests
|
US11438231B2
(en)
*
|
2019-09-25 |
2022-09-06 |
Microstrategy Incorporated |
Centralized platform management for computing environments
|
US11615185B2
(en)
|
2019-11-22 |
2023-03-28 |
Pure Storage, Inc. |
Multi-layer security threat detection for a storage system
|
US12079502B2
(en)
|
2019-11-22 |
2024-09-03 |
Pure Storage, Inc. |
Storage element attribute-based determination of a data protection policy for use within a storage system
|
US11720692B2
(en)
|
2019-11-22 |
2023-08-08 |
Pure Storage, Inc. |
Hardware token based management of recovery datasets for a storage system
|
US12067118B2
(en)
|
2019-11-22 |
2024-08-20 |
Pure Storage, Inc. |
Detection of writing to a non-header portion of a file as an indicator of a possible ransomware attack against a storage system
|
US11720714B2
(en)
|
2019-11-22 |
2023-08-08 |
Pure Storage, Inc. |
Inter-I/O relationship based detection of a security threat to a storage system
|
US11651075B2
(en)
|
2019-11-22 |
2023-05-16 |
Pure Storage, Inc. |
Extensible attack monitoring by a storage system
|
US11520907B1
(en)
|
2019-11-22 |
2022-12-06 |
Pure Storage, Inc. |
Storage system snapshot retention based on encrypted data
|
US11675898B2
(en)
|
2019-11-22 |
2023-06-13 |
Pure Storage, Inc. |
Recovery dataset management for security threat monitoring
|
US11687418B2
(en)
|
2019-11-22 |
2023-06-27 |
Pure Storage, Inc. |
Automatic generation of recovery plans specific to individual storage elements
|
US11657155B2
(en)
|
2019-11-22 |
2023-05-23 |
Pure Storage, Inc |
Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
|
US12050689B2
(en)
|
2019-11-22 |
2024-07-30 |
Pure Storage, Inc. |
Host anomaly-based generation of snapshots
|
US11341236B2
(en)
|
2019-11-22 |
2022-05-24 |
Pure Storage, Inc. |
Traffic-based detection of a security threat to a storage system
|
US12050683B2
(en)
*
|
2019-11-22 |
2024-07-30 |
Pure Storage, Inc. |
Selective control of a data synchronization setting of a storage system based on a possible ransomware attack against the storage system
|
US11500788B2
(en)
|
2019-11-22 |
2022-11-15 |
Pure Storage, Inc. |
Logical address based authorization of operations with respect to a storage system
|
US11941116B2
(en)
|
2019-11-22 |
2024-03-26 |
Pure Storage, Inc. |
Ransomware-based data protection parameter modification
|
US11625481B2
(en)
|
2019-11-22 |
2023-04-11 |
Pure Storage, Inc. |
Selective throttling of operations potentially related to a security threat to a storage system
|
US11755751B2
(en)
|
2019-11-22 |
2023-09-12 |
Pure Storage, Inc. |
Modify access restrictions in response to a possible attack against data stored by a storage system
|
US11645162B2
(en)
|
2019-11-22 |
2023-05-09 |
Pure Storage, Inc. |
Recovery point determination for data restoration in a storage system
|
US12079356B2
(en)
|
2019-11-22 |
2024-09-03 |
Pure Storage, Inc. |
Measurement interval anomaly detection-based generation of snapshots
|
US12079333B2
(en)
|
2019-11-22 |
2024-09-03 |
Pure Storage, Inc. |
Independent security threat detection and remediation by storage systems in a synchronous replication arrangement
|
KR102287981B1
(ko)
*
|
2019-12-02 |
2021-08-10 |
순천향대학교 산학협력단 |
클라우드 컴퓨팅을 위한 안전한 역할 기반 액세스 제어 시스템 및 방법
|
US11356472B1
(en)
*
|
2019-12-16 |
2022-06-07 |
Wells Fargo Bank, N.A. |
Systems and methods for using machine learning for geographic analysis of access attempts
|
US11461786B2
(en)
*
|
2020-03-02 |
2022-10-04 |
Salesforce.Com, Inc. |
Systems, methods, and apparatuses for implementing cross cloud engagement activity visualization without requiring database merge or data replication
|
US11438364B2
(en)
*
|
2020-04-30 |
2022-09-06 |
Bank Of America Corporation |
Threat analysis for information security
|
JP2023532297A
(ja)
*
|
2020-06-29 |
2023-07-27 |
イルミナ インコーポレイテッド |
セキュアな発見フレームワークを介した一時的なクラウドプロバイダクレデンシャル
|
CA3177385A1
(fr)
|
2020-06-29 |
2022-01-06 |
Prabhu PALANISAMY |
Partage de donnees genomiques a base de politiques de locataires de logiciel en tant que service
|
US11652832B2
(en)
*
|
2020-07-01 |
2023-05-16 |
Vmware, Inc. |
Automated identification of anomalous devices
|
US11526825B2
(en)
*
|
2020-07-27 |
2022-12-13 |
Cygnvs Inc. |
Cloud-based multi-tenancy computing systems and methods for providing response control and analytics
|
US11489721B2
(en)
*
|
2020-09-22 |
2022-11-01 |
Vmware, Inc. |
Dynamic compliance management
|
US11836268B2
(en)
*
|
2020-10-02 |
2023-12-05 |
Servicenow, Inc. |
Machine learning platform with model storage
|
CN112073252A
(zh)
*
|
2020-11-12 |
2020-12-11 |
北京优炫软件股份有限公司 |
一种云平台监控方法及系统、电子设备和存储介质
|
CN112560027A
(zh)
*
|
2020-12-18 |
2021-03-26 |
福建中信网安信息科技有限公司 |
一种数据安全监测系统
|
CN112783005B
(zh)
*
|
2021-01-07 |
2022-05-17 |
北京航空航天大学 |
一种基于仿真的系统理论过程分析方法
|
US11934531B2
(en)
|
2021-02-25 |
2024-03-19 |
Bank Of America Corporation |
System and method for automatically identifying software vulnerabilities using named entity recognition
|
US20220337633A1
(en)
*
|
2021-04-15 |
2022-10-20 |
Anamika Bhattacharya |
Heuristic model to self-manage and auto-update containerized services
|
US12058163B2
(en)
|
2021-08-10 |
2024-08-06 |
CyberSaint, Inc. |
Systems, media, and methods for utilizing a crosswalk algorithm to identify controls across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments
|
CN113726812B
(zh)
*
|
2021-09-08 |
2023-06-30 |
北京鼎普科技股份有限公司 |
一种终端运行日志审计方法及系统
|
US12041062B2
(en)
|
2021-09-15 |
2024-07-16 |
Cygnvs Inc. |
Systems for securely tracking incident data and automatically generating data incident reports using collaboration rooms with dynamic tenancy
|
US11477208B1
(en)
|
2021-09-15 |
2022-10-18 |
Cygnvs Inc. |
Systems and methods for providing collaboration rooms with dynamic tenancy and role-based security
|
US11354430B1
(en)
|
2021-09-16 |
2022-06-07 |
Cygnvs Inc. |
Systems and methods for dynamically establishing and managing tenancy using templates
|
US20230095756A1
(en)
*
|
2021-09-29 |
2023-03-30 |
Salesforce.Com, Inc. |
Dynamically reconfiguring a database system of a tenant based on risk profile(s) of the tenant
|
US11936785B1
(en)
|
2021-12-27 |
2024-03-19 |
Wiz, Inc. |
System and method for encrypted disk inspection utilizing disk cloning techniques
|
US12081656B1
(en)
|
2021-12-27 |
2024-09-03 |
Wiz, Inc. |
Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity
|
US20230247040A1
(en)
*
|
2022-01-31 |
2023-08-03 |
Wiz, Inc. |
Techniques for cloud detection and response from cloud logs utilizing a security graph
|
US20230275932A1
(en)
*
|
2022-02-25 |
2023-08-31 |
Vmware, Inc. |
Validation of security standard implementation for applications in protected execution environment
|
US12105808B2
(en)
*
|
2022-03-31 |
2024-10-01 |
Drata Inc. |
Automated trust center for real-time security and compliance monitoring
|
US12079328B1
(en)
|
2022-05-23 |
2024-09-03 |
Wiz, Inc. |
Techniques for inspecting running virtualizations for cybersecurity risks
|
US12061719B2
(en)
|
2022-09-28 |
2024-08-13 |
Wiz, Inc. |
System and method for agentless detection of sensitive data in computing environments
|
US12061925B1
(en)
|
2022-05-26 |
2024-08-13 |
Wiz, Inc. |
Techniques for inspecting managed workloads deployed in a cloud computing environment
|
CN115296840B
(zh)
*
|
2022-06-24 |
2024-02-27 |
上海淇玥信息技术有限公司 |
基于关联节点安全状态的安全预警方法、装置及电子设备
|
US20240039936A1
(en)
*
|
2022-08-01 |
2024-02-01 |
Wiz, Inc. |
System and method for generating normalized event logs for cloud detection and response in a multi-layered cloud environment
|
US20240039929A1
(en)
*
|
2022-08-01 |
2024-02-01 |
Wiz, Inc. |
System and method for threat detection across multiple cloud environments utilizing normalized event logs
|
GB2622071A
(en)
*
|
2022-09-01 |
2024-03-06 |
Sophos Ltd |
Cybersecurity configuration in a cloud environment
|
CN117459327B
(zh)
*
|
2023-12-22 |
2024-03-26 |
杭州海康威视数字技术股份有限公司 |
一种云数据透明加密保护方法、系统及装置
|